Difference between revisions of "Secure Remote Working - Overview"
Line 28: | Line 28: | ||
Secure Issues Include: | Secure Issues Include: | ||
*Lack of physical security - devices can be stolen, drives can be copied, or shoulder surfing. | *Lack of physical security - devices can be stolen, drives can be copied, or shoulder surfing. | ||
− | *Unsecured Networks - connecting on networks that are unsecured such as cafe wifi networks | + | *Unsecured Networks - connecting on networks that are unsecured such as cafe and hotel wifi networks and other open public networks are easy targets for exploitation. |
*Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised. | *Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised. | ||
Line 38: | Line 38: | ||
*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched. | *Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched. | ||
*Secure all remote devices by using anti-malware software and implementing strong firewall rules. | *Secure all remote devices by using anti-malware software and implementing strong firewall rules. | ||
− | *Use validated encryption to protect data | + | *Use validated encryption to protect data. |
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc... | *Encrypt device storage such as hard drives, SD Cards, USB Keys, etc... | ||
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to. | *Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to. | ||
*Disable or limit the ability to install applications on devices such as laptops and smartphones. | *Disable or limit the ability to install applications on devices such as laptops and smartphones. | ||
+ | |||
+ | ==Privacy== | ||
+ | Employee's are encouraged to use approved software such as Zoom, Google Hangouts, and Slack to collaborate and communicate unclassified information. However there are some privacy issues that need to be recognized before using these applications. | ||
+ | ===Slack=== | ||
+ | |||
== References == | == References == |
Revision as of 09:40, 24 March 2020
Heading 1 | Heading 2 | Heading 3 | Heading 4 |
---|
What is Teleworking?Teleworking by definition is an arrangement between an employee and the employer in which the employee does not commute to their physical work space, but can use the internet and other digital mediums to complete work. Methods of teleworking include:
Threats and Challenges posed by TeleworkingBy connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. Secure Issues Include:
Mitigation and Prevention MeasuresIt is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, there are a number of measures to help prevent security breaches when teleworking through all mediums.
PrivacyEmployee's are encouraged to use approved software such as Zoom, Google Hangouts, and Slack to collaborate and communicate unclassified information. However there are some privacy issues that need to be recognized before using these applications. SlackReferences
|